1. Agarwal, R., Barve, S., Shukla, S.: Detecting malicious accounts in permissionless blockchains using temporal graph properties. Appl. Network Sci. 6(9), 1–30 (2021)
2. Agarwal, R., Thapliyal, T., Shukla, S.: Detecting malicious accounts showing adversarial behavior in permissionless blockchains, pp. 1–15 (2021)
3. Alkhalifah, A., Ng, A., Kayes, A., Chowdhury, J., Alazab, M., Watters, P.: A taxonomy of blockchain threats and vulnerabilities. In: Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I. (eds.) Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications, pp. 1–26. Taylor and Francis Group (2020)
4. Angelo, M., Salzer, G.: A survey of tools for analyzing ethereum smart contracts. In: International Conference on Decentralized Applications and Infrastructures, pp. 69–78. IEEE, Newark, CA (2019)
5. Camino, R., Torres, F., Baden, M., State, R.: A data science approach for detecting honeypots in ethereum. In: International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–9. IEEE, Toronto, Canada (2020)